Knowledge Management & Information Sharing

Knowledge Management and Information Sharing is defined as the analysis and technical support of practices used in an organization to identify, create, represent, distribute, conduct, and enable the adoption and leveraging of good practices embedded in collaborative settings and, in particular, in organizational processes.

Recent Inquiries

ServiceNow Alternatives and Their Pros/Cons

Can you provide alternatives to ServiceNow for sharing research results across an organization?

Comparative Assessments of AWARS, COMBAT XXI, and Logistics Battle Command Simulations

Can you provide an AWARS, COMBAT XXI, and logistics battle command simulation comparative assessment?

Counter-small Unmanned Aerial System (C-sUAS) Efforts of NATO Allies

What information is available on C-sUAS efforts of NATO allies?

Articles

F
Hacker

CISA, U.S., and International Partners Warn of Ongoing Exploitation of Multiple Ivanti Vulnerabilities

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing & Analysis Center (MS-ISAC), Australian Signals Directorate’s Australian Cyber Security Center (ASD’s ACSC), United Kingdom’s National Cyber Security…

F
AFIMSC spearheads AI innovation at industry forum

AFIMSC Spearheads AI Innovation at Industry Forum

SAN ANTONIO, Texas – More than 120 industry, academic, and government officials gathered Feb. 20-21 at the University of Texas at San Antonio Downtown Campus for the Air Force Installation and Mission Support Center Artificial…

F
Winning paper for the 11th annual Best Scientific Cybersecurity Paper Competition Graphic

NSA Awards Authors of Study of Automated Attacks on New Webservers

The National Security Agency (NSA) Research Directorate recently selected “Uninvited Guests:  Analyzing the Identity and Behavior of Certificate Transparency Bots,” as the winner of its 11th Annual Best Scientific Cybersecurity Paper Competition. The winning paper, authored…

Webinars

RESCHEDULED: Fundamentals of Cross-Domain Solutions in the DoD

THIS WEBINAR HAS BEEN RESCHEDULED FOR WEDNESDAY, FEBRUARY 21st at 12:00 PM ET A cross-domain solution (CDS) is a capability that can be used to securely connect discrete systems or networks, which may have different…

Cyber Security and Digital Data Protection Concept

Uncomfortable Truths About Cybersecurity

In this webinar, participants will drill into the history of cybersecurity and computer science and consider some first principles. Decisions made in the 1970s by the founders of both career fields have not been revisited…

Developing the Cybersecurity Workforce: An Introduction to the NICE Framework

The Workforce Framework for Cybersecurity (National Initiative for Cybersecurity Education [NICE] Framework) (NIST SP 800-181r1) establishes a common language for describing cybersecurity work and what needs done to complete that work. It is used by…

Events

Students from UCSD visit March ARB to help incorporate Artificial Intelligence into MQ-9 Platform

2024 DAF Modeling and Simulation Summit

The theme of the 2024 Department of the Air Force (DAF) Modeling & Simulation (M&S) Summit is “Training in a Digital World”, which highlights the Department of the Air Force’s drive to upskill personnel through…

Man wearing virtual reality helmet with additional sensors attached to scalp.

GNSI Tampa Summit: AI in the Era of Strategic Competition

The revolution of Artificial Intelligence (AI) transforms the very nature of great power competition, conflict, and international cooperation. Competing effectively in this disruptive environment requires understanding how the People’s Republic of China (PRC) and other…

Military Personnel operating computer next to military aircraft

2nd Annual Air Dominance Summit

The second annual IDGA Air Dominance Summit will build upon last year’s event and bring together over 200 senior U.S. and international leaders from the fighter aircraft community for an event focused on how allied…